AusNOG 2023: RPKI and whois updates

APNIC
APNICAPNIC
1
AusNOG 2023
RPKI and Whois Updates:
RSCs, ASPAs, NRTMv4, RDAP
2
2
What is an RSC?
• RPKI Signed Checklist
• Defined in RFC 9323
• The specification provides for:
• signing one or more arbitrary files using an RPKI certificate
• packaging the signature, filenames, and hashes into an object
(the RSC itself)
• verifying the signature (i.e. “these files were signed by somebody
with authority to route 192.0.2.0/24”)
3
3
Why is it useful?
• Arbitrary files can be signed
• More flexible than existing RPKI functions
• Supports ad hoc/people-driven processes
• No need to publish in a public repository
• Associated business operations can remain
private
4
4
Use cases
• BYOIP services
• Third-party databases
• Custom RPKI applications
5
5
BYOIP services
• Support use of RIR-delegated IP addresses for BGP
announcements in cloud infrastructure
• RSCs can help to streamline the registration process
6
6
⋯
1. Get token from portal
2. Make RSC with token
3. Upload RSC to portal
4. Make ROA
7
7
Third-party databases
• Acting as cross-RIR interfaces for specific use cases (e.g.
peering)
• RSCs can be used to prove resource holdership
8
8
Custom RPKI applications
• Define new object type and use RSCs for
signing/packaging
• Useful for testing/prototyping, or for use within a closed
group of participants
• No need to go through IETF process
9
9
Current status
• Specification published in November 2022
• https://www.rfc-editor.org/rfc/rfc9323.txt
• Production code
• https://www.rpki-client.org
• Proof-of-concept code
• https://github.com/APNIC-net/rpki-rsc-demo
• https://github.com/job/draft-rpki-checklists
• https://github.com/benmaddison/rpkimancer
• APNIC implementing in early 2024
• Deferred from Q2 of this year
• In-principle support from other RIRs
10
10
What is an ASPA?
• Autonomous System Provider Authorization
• Defined in two documents:
 draft-ietf-sidrops-aspa-profile
 draft-ietf-sidrops-aspa-verification
• The specifications provide for:
• an ASN holder signing an object that defines its upstream ASes
• a network operator using that data to verify the AS_PATH of a
received route
11
11
Why is it useful?
• Detect and mitigate route leaks
• Compare ROV, which is about the origin only
• Protect against certain types of
forged-origin/forged-path attacks
• Attacker must resort to longer AS paths for
route to be accepted
12
12
Upstream validation
• 1. If AS path has single entry
• 2. If AS path contains hop
from provider to customer
• 3. If AS path contains hop
without ASPA
• 4. Otherwise, all hops are
from customer to provider
13
13
Upstream validation examples (1)
• Single-element AS
path
• ASPA state not
relevant
• Not possible for it to
be a route leak
AS1
AS
This AS is the
upstream, receiving
the route
•
Arrows indicate AS path, from origin through peers
•
Blue box contains route: only the AS path is relevant to
ASPA validation, so the prefix is omitted
•
Black arrow: ASPA state between the two ASNs is
irrelevant
14
14
Upstream validation examples (2)
• Two-element AS
path
• No ASPAs
• Unable to
determine validity
AS1
AS
AS2
•
Blue line: no ASPA for
customer-provider pair
15
15
Upstream validation examples (3)
• Two-element AS
path
• ASPA exists for AS1
(origin)
• Able to determine
validity
AS1
AS
AS2
AS Providers
AS1 AS2
•
Within route, higher
ASes are providers for
lower ASes
•
Green line: ASPA
exists for customer-
provider pair
ASPAs
16
16
Upstream validation examples (4)
AS
• Two-element AS path
• ASPA exists for AS1
(origin), but disclaims
AS2 as provider
• Able to determine
validity
AS1
AS2
AS Providers
AS1 AS3
•
Red line: ASPA exists
for customer, but does
not contain provider
ASN
ASPAs
17
17
Downstream validation
• 1. If AS path has:
 Up-ramp, customer(s) through provider(s)
 Down-ramp, provider(s) through customer(s)
 No hops in the middle, or single lateral hop
• 2. If AS path contains ‘valley’ (hop from provider to
customer, then from customer to provider)
• 3. Otherwise, unable to determine validity
18
18
Downstream validation examples (1)
• Single-element AS
path
• ASPA state not
relevant
• Not possible for it to
be a route leak
AS1
AS
This AS is the
downstream,
receiving the
route
19
19
Downstream validation examples (2)
• Two-element AS
path
• No ASPAs
• Not possible for it
to be a route leak
AS1
AS
AS2
20
20
Downstream validation examples (3)
• Three-element AS
path
• No ASPAs
• Unable to
determine validity
AS1
AS
AS2
AS3
21
21
Downstream validation examples (4)
• Three-element
AS path
• ASPA exists for
AS1 (origin)
• Route leak not
possible
AS1
AS
AS2
AS3
AS Providers
AS1 AS2
ASPAs
22
22
Downstream validation examples (5)
• Three-element
AS path
• ASPA exists for
AS3 (neighbour)
• Route leak not
possible
AS1
AS
AS2
AS3
AS Providers
AS3 AS2
Within route, lower ASes
are customers of higher
ASes
ASPAs
23
23
Downstream validation examples (6)
• Three-element
AS path
• ASPAs exist for
AS1 and AS3
• Route leak not
possible
AS1
AS
AS2
AS3
AS Providers
AS1 AS2
AS3 AS2
ASPAs
24
24
Downstream validation examples (7)
• Three-element AS
path
• AS0 ASPA now
exists for AS2, to
indicate absence of
providers
• Route leak not
possible
AS1
AS
AS2
AS3
AS Providers
AS1 AS2
AS2 AS0
AS3 AS2
ASPAs
25
25
Downstream validation examples (8)
• Three-element AS
path
• AS1 ASPA exists,
but does not
include AS2
• Route leak still
not possible
AS1
AS
AS2
AS3
AS Providers
AS1 AS4
AS3 AS2
ASPAs
26
26
Downstream validation examples (9)
• Three-element AS
path
• AS1 ASPA exists, but
does not include AS2
• No AS3 ASPA
• Unable to determine
validity status
AS Providers
AS1 AS4
ASPAs AS1
AS
AS2
AS3
27
27
Downstream validation examples (10)
• Three-element AS
path
• AS1 and AS3
ASPAs both
present, but neither
lists AS2
• Route leak
AS1
AS
AS2
AS3
AS Providers
AS1 AS4
AS3 AS5
ASPAs
28
28
Downstream validation examples (11)
• Four-element AS
path
• Valley from AS2 to
AS3 (customer) to
AS4 indicates route
leak
AS1
AS
AS2
AS3
AS4
AS Providers
AS1 AS2
AS2 AS0
AS3 AS2, AS4
AS4 AS0
ASPAs
29
29
Forged-origin/path attacks
• Attacker uses correct origin (AS1), but inserts own ASN into the AS path
immediately after the origin
• If AS1 has registered an ASPA, and AS2 (target recipient) receives route
over lateral peer, AS2 will classify the route as invalid
• Attacker can evade this by adding a valid upstream ASN after the origin and
before its own ASN
• But if the ASN that is added also has an ASPA, then the attacker needs to
add more ASNs until it reaches an ASN without an ASPA
• Plus, this all makes the path longer, and the route less likely to be
used/preferred
30
30
Risks
• “If I turn this on, do I get more helpdesk calls?”
• A single mistaken ASPA change can invalidate all routes
that pass through the affected AS
• But the damage here is akin to the relevant AS
disappearing: if it’s a SPOF today, it will be a SPOF with
ASPA enabled
• Also, ASPAs for apex ASes have no effect in practice: it’s
not possible to invalidate routes by way of changes to such
ASPAs
31
31
Current status
• Specifications currently in IETF Working
Group Last Call
• Production code
• Krill (CA)
• Routinator (RP)
• rpki-client (RP)
• OpenBGPD (router)
• NIST BGP-SRx (router)
• (No Cisco/Juniper/similar yet)
• RIPE provide API for creating ASPA objects in
the localcert.ripe.net environment (test)
• APNIC planning to implement hosted CA
functionality in 2024
32
32
What is NRTMv4?
• Near Real Time Mirroring (v4)
• Defined in draft-ietf-grow-nrtm-v4
• Provides for maintaining a local, up-to-date (< 10 minutes)
copy of a remote Whois/IRR database:
• RADb, RIPE, APNIC, etc.
• Successor to earlier, less formal versions of NRTM
33
33
Why is it useful?
$ whois -hnrtm.apnic.net -p43003 -- -g APNIC:3:11088811-11088812
% How to use this server http://www.apnic.net/db/
%START Version: 3 APNIC 11088811-11088812 FILTERED
ADD
inetnum: 123.243.122.216 - 123.243.122.219
netname: TPGInternetPtyLtd
descr: TPG Internet Pty Ltd.
...
last-modified: 2023-06-30T03:44:27Z
source: APNIC
DEL
inetnum: 14.201.196.140 - 14.201.196.143
netname: TPGInternetPtyLtd
descr: TPG Internet Pty Ltd.
...
last-modified: 2023-06-28T01:16:39Z
source: APNIC
%END APNIC
$
• NRTM v3 and earlier have various
shortcomings
• Ad hoc response structuring
• Underspecified:
• No formal documentation
• Error states not clear
• End of stream not clear
• Initial state not handled in-band
• Sync failure requires manual
intervention
34
34
Why is it useful?
$ curl -s https://nrtm-rc.db.ripe.net/nrtmv4/RIPE/update-
notification-file.json | jq .
{
"nrtm_version": 4,
"timestamp": "2023-06-30T00:06:00Z",
"type": "notification",
"source": "RIPE",
"session_id": "912dbc2b-3d9a-4731-81a3-fd03f10afa67",
"version": 5,
"snapshot": {
"version": 5,
"url": "https://nrtm-rc.db.ripe.net/nrtmv4/RIPE/nrtm-
snapshot.5.RIPE.912dbc2b-3d9a-4731-81a3-
fd03f10afa67.4720f594658f35d29f3106da47096242.json.gz",
"hash":
"36ba8e20b36f03514d314e660b390cfc2f0a248e9516d7de869a4577c7e
5d072"
},
"deltas": []
}
$
• NRTMv4 addresses these
problems
• HTTP/JSON
• Standardised via IETF
• All data is signed
• Based on RRDP: snapshots
available in-band
35
35
Current status
• Specification currently being worked on in
IETF Global Routing Operations (grow) WG
• Proof-of-concept code
• https://github.com/RIPE-NCC/whois
• https://github.com/petchells/nrtm4client
• RIPE provide public test service
• Developed by IRRd v4 maintainer, so will be
implemented there as well
• IRRd used by e.g. RADb
• Depending on interest, APNIC will deploy
based on RIPE’s implementation
36
36
RDAP updates: RIR RDAP profile
• Available at
https://www.iana.org/assignments/rdap-extensions/rdap-extensions.
xhtml
• Implemented by all RIRs except LACNIC, who plan to implement
later this year
• Ensures cross-RIR consistency
• Redirects
• Resource status
• Contact data formatting/elements
37
37
RDAP updates: reverse search
draft-ietf-regext-rdap-reverse-search
• Supports operations like finding resources
associated with a given contact
• Most RIRs provide this functionality today via their
Whois services
38
38
RDAP updates: RIR search
draft-ietf-regext-rdap-rir-search
• Basic IP/ASN search
• Reverse search extensions for IP/ASN records
• Searches for more-specific and less-specific
resources
39
Questions?
1 sur 39

Recommandé

4th ICANN APAC-TWNIC Engagement Forum and 39th TWNIC OPM: RPKI Updates - RSCs... par
4th ICANN APAC-TWNIC Engagement Forum and 39th TWNIC OPM: RPKI Updates - RSCs...4th ICANN APAC-TWNIC Engagement Forum and 39th TWNIC OPM: RPKI Updates - RSCs...
4th ICANN APAC-TWNIC Engagement Forum and 39th TWNIC OPM: RPKI Updates - RSCs...APNIC
211 vues28 diapositives
Internet Routing Registry and RPKI Tutorial, by Nurul Islam Roman [APNIC 38] par
Internet Routing Registry and RPKI Tutorial, by Nurul Islam Roman [APNIC 38]Internet Routing Registry and RPKI Tutorial, by Nurul Islam Roman [APNIC 38]
Internet Routing Registry and RPKI Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
1.7K vues81 diapositives
32nd TWNIC IP OPM: ROA+ROV deployment & industry development par
32nd TWNIC IP OPM: ROA+ROV deployment & industry development32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry developmentAPNIC
398 vues37 diapositives
Internet Routing Registry Tutorial, by Nurul Islam Roman [APRICOT 2015] par
Internet Routing Registry Tutorial, by Nurul Islam Roman [APRICOT 2015]Internet Routing Registry Tutorial, by Nurul Islam Roman [APRICOT 2015]
Internet Routing Registry Tutorial, by Nurul Islam Roman [APRICOT 2015]APNIC
2.5K vues79 diapositives
IRR Tutorial and RPKI Demo par
IRR Tutorial and RPKI DemoIRR Tutorial and RPKI Demo
IRR Tutorial and RPKI DemoAPNIC
2.4K vues105 diapositives
E rou01 routing_basics par
E rou01 routing_basicsE rou01 routing_basics
E rou01 routing_basicstanawan44
489 vues37 diapositives

Contenu connexe

Similaire à AusNOG 2023: RPKI and whois updates

PacNOG 24: Securing Internet Routing par
PacNOG 24: Securing Internet RoutingPacNOG 24: Securing Internet Routing
PacNOG 24: Securing Internet RoutingAPNIC
260 vues33 diapositives
APAN 50: RPKI industry trends and initiatives par
APAN 50: RPKI industry trends and initiatives APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives APNIC
796 vues41 diapositives
Wrou01 par
Wrou01Wrou01
Wrou01tanawan44
629 vues292 diapositives
Prefix Filtering BCP par
Prefix Filtering BCP Prefix Filtering BCP
Prefix Filtering BCP Bangladesh Network Operators Group
812 vues32 diapositives
btNOG 6: Securing Internet Routing par
btNOG 6: Securing Internet RoutingbtNOG 6: Securing Internet Routing
btNOG 6: Securing Internet RoutingAPNIC
215 vues33 diapositives
SANOG 34: Securing Internet Routing par
SANOG 34: Securing Internet RoutingSANOG 34: Securing Internet Routing
SANOG 34: Securing Internet RoutingAPNIC
418 vues34 diapositives

Similaire à AusNOG 2023: RPKI and whois updates(20)

PacNOG 24: Securing Internet Routing par APNIC
PacNOG 24: Securing Internet RoutingPacNOG 24: Securing Internet Routing
PacNOG 24: Securing Internet Routing
APNIC260 vues
APAN 50: RPKI industry trends and initiatives par APNIC
APAN 50: RPKI industry trends and initiatives APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives
APNIC796 vues
btNOG 6: Securing Internet Routing par APNIC
btNOG 6: Securing Internet RoutingbtNOG 6: Securing Internet Routing
btNOG 6: Securing Internet Routing
APNIC215 vues
SANOG 34: Securing Internet Routing par APNIC
SANOG 34: Securing Internet RoutingSANOG 34: Securing Internet Routing
SANOG 34: Securing Internet Routing
APNIC418 vues
LkNOG 3: Securing Internet Routing par APNIC
LkNOG 3: Securing Internet RoutingLkNOG 3: Securing Internet Routing
LkNOG 3: Securing Internet Routing
APNIC337 vues
Prefix Filtering Design Issues and Best Practise by Nurul Islam par MyNOG
Prefix Filtering Design Issues and Best Practise by Nurul IslamPrefix Filtering Design Issues and Best Practise by Nurul Islam
Prefix Filtering Design Issues and Best Practise by Nurul Islam
MyNOG1.1K vues
Routing Security Workshop par RIPE NCC
Routing Security WorkshopRouting Security Workshop
Routing Security Workshop
RIPE NCC958 vues
mnNOG 1: Securing internet Routing par APNIC
mnNOG 1: Securing internet Routing mnNOG 1: Securing internet Routing
mnNOG 1: Securing internet Routing
APNIC588 vues
RPKI Overview, Case Studies, Deployment and Operations par APNIC
RPKI Overview, Case Studies, Deployment and OperationsRPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and Operations
APNIC183 vues
Sips must die, die, die - about TLS usage in the SIP protocol par Olle E Johansson
Sips must die, die, die - about TLS usage in the SIP protocolSips must die, die, die - about TLS usage in the SIP protocol
Sips must die, die, die - about TLS usage in the SIP protocol
Olle E Johansson2.4K vues
NANOG 80: Measuring RPKI Effectiveness par APNIC
NANOG 80: Measuring RPKI EffectivenessNANOG 80: Measuring RPKI Effectiveness
NANOG 80: Measuring RPKI Effectiveness
APNIC168 vues
MMIX Peering Forum: Securing Internet Routing par APNIC
MMIX Peering Forum: Securing Internet RoutingMMIX Peering Forum: Securing Internet Routing
MMIX Peering Forum: Securing Internet Routing
APNIC264 vues
Network protocols and vulnerabilities par G Prachi
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
G Prachi1.6K vues
BGP Flexibility and Its Consequences par APNIC
BGP Flexibility and Its ConsequencesBGP Flexibility and Its Consequences
BGP Flexibility and Its Consequences
APNIC80 vues
BGP Flexibility and its Consequences. par Qrator Labs
BGP Flexibility and its Consequences. BGP Flexibility and its Consequences.
BGP Flexibility and its Consequences.
Qrator Labs72 vues
BKNIX Peering Forum 2019: Securing Internet Routing par APNIC
BKNIX Peering Forum 2019: Securing Internet RoutingBKNIX Peering Forum 2019: Securing Internet Routing
BKNIX Peering Forum 2019: Securing Internet Routing
APNIC277 vues

Plus de APNIC

IETF 118: Starlink Protocol Performance par
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol PerformanceAPNIC
124 vues22 diapositives
HKNOG 12.0: RPKI Actions Required by HK Networks par
HKNOG 12.0: RPKI Actions Required by HK NetworksHKNOG 12.0: RPKI Actions Required by HK Networks
HKNOG 12.0: RPKI Actions Required by HK NetworksAPNIC
453 vues26 diapositives
KHNOG 5: RPKI Status Update par
KHNOG 5: RPKI Status UpdateKHNOG 5: RPKI Status Update
KHNOG 5: RPKI Status UpdateAPNIC
401 vues25 diapositives
KHNOG 5: APNIC Services par
KHNOG 5: APNIC ServicesKHNOG 5: APNIC Services
KHNOG 5: APNIC ServicesAPNIC
414 vues15 diapositives
PITA Strategy Forum 2023: Internet resilience par
PITA Strategy Forum 2023: Internet resiliencePITA Strategy Forum 2023: Internet resilience
PITA Strategy Forum 2023: Internet resilienceAPNIC
438 vues7 diapositives
SANOG 40: DDoS in South Asia par
SANOG 40: DDoS in South AsiaSANOG 40: DDoS in South Asia
SANOG 40: DDoS in South AsiaAPNIC
350 vues52 diapositives

Plus de APNIC(20)

IETF 118: Starlink Protocol Performance par APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC124 vues
HKNOG 12.0: RPKI Actions Required by HK Networks par APNIC
HKNOG 12.0: RPKI Actions Required by HK NetworksHKNOG 12.0: RPKI Actions Required by HK Networks
HKNOG 12.0: RPKI Actions Required by HK Networks
APNIC453 vues
KHNOG 5: RPKI Status Update par APNIC
KHNOG 5: RPKI Status UpdateKHNOG 5: RPKI Status Update
KHNOG 5: RPKI Status Update
APNIC401 vues
KHNOG 5: APNIC Services par APNIC
KHNOG 5: APNIC ServicesKHNOG 5: APNIC Services
KHNOG 5: APNIC Services
APNIC414 vues
PITA Strategy Forum 2023: Internet resilience par APNIC
PITA Strategy Forum 2023: Internet resiliencePITA Strategy Forum 2023: Internet resilience
PITA Strategy Forum 2023: Internet resilience
APNIC438 vues
SANOG 40: DDoS in South Asia par APNIC
SANOG 40: DDoS in South AsiaSANOG 40: DDoS in South Asia
SANOG 40: DDoS in South Asia
APNIC350 vues
SANOG 40: RPKI in South Asia par APNIC
SANOG 40: RPKI in South AsiaSANOG 40: RPKI in South Asia
SANOG 40: RPKI in South Asia
APNIC351 vues
RenasCON 2023: Learning from honeypots par APNIC
RenasCON 2023: Learning from honeypotsRenasCON 2023: Learning from honeypots
RenasCON 2023: Learning from honeypots
APNIC426 vues
IGF 2023: DNS Privacy par APNIC
IGF 2023: DNS PrivacyIGF 2023: DNS Privacy
IGF 2023: DNS Privacy
APNIC428 vues
MNSEC Conference 2023: Mining Bots par APNIC
MNSEC Conference 2023: Mining BotsMNSEC Conference 2023: Mining Bots
MNSEC Conference 2023: Mining Bots
APNIC421 vues
VNIX-NOG 2023: IPv6 Deployment in government networks par APNIC
VNIX-NOG 2023: IPv6 Deployment in government networksVNIX-NOG 2023: IPv6 Deployment in government networks
VNIX-NOG 2023: IPv6 Deployment in government networks
APNIC427 vues
VNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalids par APNIC
VNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalidsVNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalids
VNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalids
APNIC422 vues
SGNOG 10: IPv6 Insights in South East Asia par APNIC
SGNOG 10: IPv6 Insights in South East AsiaSGNOG 10: IPv6 Insights in South East Asia
SGNOG 10: IPv6 Insights in South East Asia
APNIC416 vues
mnNOG 5: Open source SD-WAN par APNIC
mnNOG 5: Open source SD-WANmnNOG 5: Open source SD-WAN
mnNOG 5: Open source SD-WAN
APNIC482 vues
mnNOG 2023: State of IPv6 in Mongolia par APNIC
mnNOG 2023: State of IPv6 in MongoliamnNOG 2023: State of IPv6 in Mongolia
mnNOG 2023: State of IPv6 in Mongolia
APNIC933 vues
mnNOG 2023: On GEOs, LEOs and Starlink par APNIC
mnNOG 2023: On GEOs, LEOs and StarlinkmnNOG 2023: On GEOs, LEOs and Starlink
mnNOG 2023: On GEOs, LEOs and Starlink
APNIC495 vues
AusNOG 2023: A quick look at QUIC par APNIC
AusNOG 2023: A quick look at QUICAusNOG 2023: A quick look at QUIC
AusNOG 2023: A quick look at QUIC
APNIC583 vues
APrIGF 2023: Sustainability of Complementary Connectivity Initiatives par APNIC
APrIGF 2023: Sustainability of Complementary Connectivity InitiativesAPrIGF 2023: Sustainability of Complementary Connectivity Initiatives
APrIGF 2023: Sustainability of Complementary Connectivity Initiatives
APNIC607 vues
APAN 56: APNIC Report par APNIC
APAN 56: APNIC Report APAN 56: APNIC Report
APAN 56: APNIC Report
APNIC293 vues
2023 NCIT: Introduction to Intrusion Detection par APNIC
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
APNIC172 vues

Dernier

Existing documentaries (1).docx par
Existing documentaries (1).docxExisting documentaries (1).docx
Existing documentaries (1).docxMollyBrown86
13 vues5 diapositives
childcare.pdf par
childcare.pdfchildcare.pdf
childcare.pdffatma alnaqbi
14 vues4 diapositives
information par
informationinformation
informationkhelgishekhar
7 vues4 diapositives
Building trust in our information ecosystem: who do we trust in an emergency par
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergencyTina Purnat
85 vues18 diapositives
OMS: Diretrizes para um controle da promoção comercial dos ditos substitutos ... par
OMS: Diretrizes para um controle da promoção comercial dos ditos substitutos ...OMS: Diretrizes para um controle da promoção comercial dos ditos substitutos ...
OMS: Diretrizes para um controle da promoção comercial dos ditos substitutos ...Prof. Marcus Renato de Carvalho
88 vues24 diapositives
zotabet.pdf par
zotabet.pdfzotabet.pdf
zotabet.pdfzotabetcasino
6 vues1 diapositive

Dernier(20)

Existing documentaries (1).docx par MollyBrown86
Existing documentaries (1).docxExisting documentaries (1).docx
Existing documentaries (1).docx
MollyBrown8613 vues
Building trust in our information ecosystem: who do we trust in an emergency par Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat85 vues
PORTFOLIO 1 (Bret Michael Pepito).pdf par brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04107 vues
google forms survey (1).pptx par MollyBrown86
google forms survey (1).pptxgoogle forms survey (1).pptx
google forms survey (1).pptx
MollyBrown8614 vues
UiPath Document Understanding_Day 3.pptx par UiPathCommunity
UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptx
UiPathCommunity95 vues
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf par RIPE NCC
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfIGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
RIPE NCC15 vues
We see everywhere that many people are talking about technology.docx par ssuserc5935b
We see everywhere that many people are talking about technology.docxWe see everywhere that many people are talking about technology.docx
We see everywhere that many people are talking about technology.docx
ssuserc5935b6 vues

AusNOG 2023: RPKI and whois updates

  • 1. 1 AusNOG 2023 RPKI and Whois Updates: RSCs, ASPAs, NRTMv4, RDAP
  • 2. 2 2 What is an RSC? • RPKI Signed Checklist • Defined in RFC 9323 • The specification provides for: • signing one or more arbitrary files using an RPKI certificate • packaging the signature, filenames, and hashes into an object (the RSC itself) • verifying the signature (i.e. “these files were signed by somebody with authority to route 192.0.2.0/24”)
  • 3. 3 3 Why is it useful? • Arbitrary files can be signed • More flexible than existing RPKI functions • Supports ad hoc/people-driven processes • No need to publish in a public repository • Associated business operations can remain private
  • 4. 4 4 Use cases • BYOIP services • Third-party databases • Custom RPKI applications
  • 5. 5 5 BYOIP services • Support use of RIR-delegated IP addresses for BGP announcements in cloud infrastructure • RSCs can help to streamline the registration process
  • 6. 6 6 ⋯ 1. Get token from portal 2. Make RSC with token 3. Upload RSC to portal 4. Make ROA
  • 7. 7 7 Third-party databases • Acting as cross-RIR interfaces for specific use cases (e.g. peering) • RSCs can be used to prove resource holdership
  • 8. 8 8 Custom RPKI applications • Define new object type and use RSCs for signing/packaging • Useful for testing/prototyping, or for use within a closed group of participants • No need to go through IETF process
  • 9. 9 9 Current status • Specification published in November 2022 • https://www.rfc-editor.org/rfc/rfc9323.txt • Production code • https://www.rpki-client.org • Proof-of-concept code • https://github.com/APNIC-net/rpki-rsc-demo • https://github.com/job/draft-rpki-checklists • https://github.com/benmaddison/rpkimancer • APNIC implementing in early 2024 • Deferred from Q2 of this year • In-principle support from other RIRs
  • 10. 10 10 What is an ASPA? • Autonomous System Provider Authorization • Defined in two documents:  draft-ietf-sidrops-aspa-profile  draft-ietf-sidrops-aspa-verification • The specifications provide for: • an ASN holder signing an object that defines its upstream ASes • a network operator using that data to verify the AS_PATH of a received route
  • 11. 11 11 Why is it useful? • Detect and mitigate route leaks • Compare ROV, which is about the origin only • Protect against certain types of forged-origin/forged-path attacks • Attacker must resort to longer AS paths for route to be accepted
  • 12. 12 12 Upstream validation • 1. If AS path has single entry • 2. If AS path contains hop from provider to customer • 3. If AS path contains hop without ASPA • 4. Otherwise, all hops are from customer to provider
  • 13. 13 13 Upstream validation examples (1) • Single-element AS path • ASPA state not relevant • Not possible for it to be a route leak AS1 AS This AS is the upstream, receiving the route • Arrows indicate AS path, from origin through peers • Blue box contains route: only the AS path is relevant to ASPA validation, so the prefix is omitted • Black arrow: ASPA state between the two ASNs is irrelevant
  • 14. 14 14 Upstream validation examples (2) • Two-element AS path • No ASPAs • Unable to determine validity AS1 AS AS2 • Blue line: no ASPA for customer-provider pair
  • 15. 15 15 Upstream validation examples (3) • Two-element AS path • ASPA exists for AS1 (origin) • Able to determine validity AS1 AS AS2 AS Providers AS1 AS2 • Within route, higher ASes are providers for lower ASes • Green line: ASPA exists for customer- provider pair ASPAs
  • 16. 16 16 Upstream validation examples (4) AS • Two-element AS path • ASPA exists for AS1 (origin), but disclaims AS2 as provider • Able to determine validity AS1 AS2 AS Providers AS1 AS3 • Red line: ASPA exists for customer, but does not contain provider ASN ASPAs
  • 17. 17 17 Downstream validation • 1. If AS path has:  Up-ramp, customer(s) through provider(s)  Down-ramp, provider(s) through customer(s)  No hops in the middle, or single lateral hop • 2. If AS path contains ‘valley’ (hop from provider to customer, then from customer to provider) • 3. Otherwise, unable to determine validity
  • 18. 18 18 Downstream validation examples (1) • Single-element AS path • ASPA state not relevant • Not possible for it to be a route leak AS1 AS This AS is the downstream, receiving the route
  • 19. 19 19 Downstream validation examples (2) • Two-element AS path • No ASPAs • Not possible for it to be a route leak AS1 AS AS2
  • 20. 20 20 Downstream validation examples (3) • Three-element AS path • No ASPAs • Unable to determine validity AS1 AS AS2 AS3
  • 21. 21 21 Downstream validation examples (4) • Three-element AS path • ASPA exists for AS1 (origin) • Route leak not possible AS1 AS AS2 AS3 AS Providers AS1 AS2 ASPAs
  • 22. 22 22 Downstream validation examples (5) • Three-element AS path • ASPA exists for AS3 (neighbour) • Route leak not possible AS1 AS AS2 AS3 AS Providers AS3 AS2 Within route, lower ASes are customers of higher ASes ASPAs
  • 23. 23 23 Downstream validation examples (6) • Three-element AS path • ASPAs exist for AS1 and AS3 • Route leak not possible AS1 AS AS2 AS3 AS Providers AS1 AS2 AS3 AS2 ASPAs
  • 24. 24 24 Downstream validation examples (7) • Three-element AS path • AS0 ASPA now exists for AS2, to indicate absence of providers • Route leak not possible AS1 AS AS2 AS3 AS Providers AS1 AS2 AS2 AS0 AS3 AS2 ASPAs
  • 25. 25 25 Downstream validation examples (8) • Three-element AS path • AS1 ASPA exists, but does not include AS2 • Route leak still not possible AS1 AS AS2 AS3 AS Providers AS1 AS4 AS3 AS2 ASPAs
  • 26. 26 26 Downstream validation examples (9) • Three-element AS path • AS1 ASPA exists, but does not include AS2 • No AS3 ASPA • Unable to determine validity status AS Providers AS1 AS4 ASPAs AS1 AS AS2 AS3
  • 27. 27 27 Downstream validation examples (10) • Three-element AS path • AS1 and AS3 ASPAs both present, but neither lists AS2 • Route leak AS1 AS AS2 AS3 AS Providers AS1 AS4 AS3 AS5 ASPAs
  • 28. 28 28 Downstream validation examples (11) • Four-element AS path • Valley from AS2 to AS3 (customer) to AS4 indicates route leak AS1 AS AS2 AS3 AS4 AS Providers AS1 AS2 AS2 AS0 AS3 AS2, AS4 AS4 AS0 ASPAs
  • 29. 29 29 Forged-origin/path attacks • Attacker uses correct origin (AS1), but inserts own ASN into the AS path immediately after the origin • If AS1 has registered an ASPA, and AS2 (target recipient) receives route over lateral peer, AS2 will classify the route as invalid • Attacker can evade this by adding a valid upstream ASN after the origin and before its own ASN • But if the ASN that is added also has an ASPA, then the attacker needs to add more ASNs until it reaches an ASN without an ASPA • Plus, this all makes the path longer, and the route less likely to be used/preferred
  • 30. 30 30 Risks • “If I turn this on, do I get more helpdesk calls?” • A single mistaken ASPA change can invalidate all routes that pass through the affected AS • But the damage here is akin to the relevant AS disappearing: if it’s a SPOF today, it will be a SPOF with ASPA enabled • Also, ASPAs for apex ASes have no effect in practice: it’s not possible to invalidate routes by way of changes to such ASPAs
  • 31. 31 31 Current status • Specifications currently in IETF Working Group Last Call • Production code • Krill (CA) • Routinator (RP) • rpki-client (RP) • OpenBGPD (router) • NIST BGP-SRx (router) • (No Cisco/Juniper/similar yet) • RIPE provide API for creating ASPA objects in the localcert.ripe.net environment (test) • APNIC planning to implement hosted CA functionality in 2024
  • 32. 32 32 What is NRTMv4? • Near Real Time Mirroring (v4) • Defined in draft-ietf-grow-nrtm-v4 • Provides for maintaining a local, up-to-date (< 10 minutes) copy of a remote Whois/IRR database: • RADb, RIPE, APNIC, etc. • Successor to earlier, less formal versions of NRTM
  • 33. 33 33 Why is it useful? $ whois -hnrtm.apnic.net -p43003 -- -g APNIC:3:11088811-11088812 % How to use this server http://www.apnic.net/db/ %START Version: 3 APNIC 11088811-11088812 FILTERED ADD inetnum: 123.243.122.216 - 123.243.122.219 netname: TPGInternetPtyLtd descr: TPG Internet Pty Ltd. ... last-modified: 2023-06-30T03:44:27Z source: APNIC DEL inetnum: 14.201.196.140 - 14.201.196.143 netname: TPGInternetPtyLtd descr: TPG Internet Pty Ltd. ... last-modified: 2023-06-28T01:16:39Z source: APNIC %END APNIC $ • NRTM v3 and earlier have various shortcomings • Ad hoc response structuring • Underspecified: • No formal documentation • Error states not clear • End of stream not clear • Initial state not handled in-band • Sync failure requires manual intervention
  • 34. 34 34 Why is it useful? $ curl -s https://nrtm-rc.db.ripe.net/nrtmv4/RIPE/update- notification-file.json | jq . { "nrtm_version": 4, "timestamp": "2023-06-30T00:06:00Z", "type": "notification", "source": "RIPE", "session_id": "912dbc2b-3d9a-4731-81a3-fd03f10afa67", "version": 5, "snapshot": { "version": 5, "url": "https://nrtm-rc.db.ripe.net/nrtmv4/RIPE/nrtm- snapshot.5.RIPE.912dbc2b-3d9a-4731-81a3- fd03f10afa67.4720f594658f35d29f3106da47096242.json.gz", "hash": "36ba8e20b36f03514d314e660b390cfc2f0a248e9516d7de869a4577c7e 5d072" }, "deltas": [] } $ • NRTMv4 addresses these problems • HTTP/JSON • Standardised via IETF • All data is signed • Based on RRDP: snapshots available in-band
  • 35. 35 35 Current status • Specification currently being worked on in IETF Global Routing Operations (grow) WG • Proof-of-concept code • https://github.com/RIPE-NCC/whois • https://github.com/petchells/nrtm4client • RIPE provide public test service • Developed by IRRd v4 maintainer, so will be implemented there as well • IRRd used by e.g. RADb • Depending on interest, APNIC will deploy based on RIPE’s implementation
  • 36. 36 36 RDAP updates: RIR RDAP profile • Available at https://www.iana.org/assignments/rdap-extensions/rdap-extensions. xhtml • Implemented by all RIRs except LACNIC, who plan to implement later this year • Ensures cross-RIR consistency • Redirects • Resource status • Contact data formatting/elements
  • 37. 37 37 RDAP updates: reverse search draft-ietf-regext-rdap-reverse-search • Supports operations like finding resources associated with a given contact • Most RIRs provide this functionality today via their Whois services
  • 38. 38 38 RDAP updates: RIR search draft-ietf-regext-rdap-rir-search • Basic IP/ASN search • Reverse search extensions for IP/ASN records • Searches for more-specific and less-specific resources